What’s Hiding Behind that DDoS Attack?

Multi-vector patterns of DDoS attacks are becoming more commonplace in the world of cyber warfare. From the volumetric attacks aimed to fill your pipe and squeeze your Internet bandwidth down to nothing, to the low and slow application layer attacks that sneak right through traditional defenses – combination attacks are becoming the norm. When peeling back the onion a bit to try and understand the motivations, but also the collateral damage, an interesting trend is coming to light.

DDoS attacks are increasingly used as a smokescreen to camouflage other cyber-attacks, including data breaches and  financial fraud. The disruption caused by the DDoS attack can expose weaknesses in organizations’ cyber defenses or overwhelm other security tools, like firewalls or IPS/IDS, opening the door for cyber criminals to plant malware or steal sensitive information.

DDoS as a smokescreen isn’t necessarily a new technique, as pointed out by Industry Experts for some time: "DDoS has been around for a long time, but using the attacks to distract staff while [attackers attempt fraud] is a new trend," says Avivah Litan, an analyst with the consultancy Gartner.

Just this week, Neustar has reported that “55% of DDoS targets were also victims of theft. Attackers stole funds, customer data and intellectual property.” This statistic signals a growing trend in DDoS crime that requires proper defense mechanisms to eliminate the additional hidden dangers lurking behind your everyday DDoS attack.

A purpose built combination of hardware and software technologies provide an effective, reliable and powerful always-on DDoS defense that efficiently mitigates network layer and application layer DDoS attacks while ensuring legitimate network traffic and web servers to function at normal levels. In turn, cleaning up the malicious Internet traffic designed to wreak havoc on your business.

You May Also Be Interested In: